z-logo
open-access-imgOpen Access
Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey
Author(s) -
Raghi Roy,
P. Paul
Publication year - 2017
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2017913642
Subject(s) - proxy re encryption , computer science , proxy (statistics) , cloud computing , encryption , computer security , database , operating system , public key cryptography , machine learning
This paper presents a survey on Proxy re-encryption techniques with respect to secure cloud data and its application. To keep sensitive user data confidential against untrusted servers, cryptographic methods are used to provide security and access control in clouds. As the data is shared over the network, it is needed to be encrypted. There are many encryption schemes that provide security and access control over the network.Proxy re-encryption enables the semi-trusted proxy server to re-encrypt the ciphertext encrypted under Alice’s public key to another ciphertext encrypted under Bob’s public key. The re-encryption is done without the server being able to decrypt the ciphertext.Cloud services and applications should follow the standard security measures including data confidentiality, integrity,privacy, robustness and access control.In this paper the proxy re-encryption(PRE) schemes, Conditional PRE,Identity based PRE and Broadcast PRE,Type based PRE, Key private PRE,Attribute based PRE,Threshold PRE and its role in securing the cloud data are explained.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom